{"id":414,"date":"2016-05-13T11:14:43","date_gmt":"2016-05-13T10:14:43","guid":{"rendered":"http:\/\/zsteva.info\/blog\/?p=414"},"modified":"2016-05-13T11:14:43","modified_gmt":"2016-05-13T10:14:43","slug":"putty-proxycommand","status":"publish","type":"post","link":"http:\/\/zsteva.info\/blog\/2016\/05\/putty-proxycommand\/","title":{"rendered":"Putty ProxyCommand"},"content":{"rendered":"<p>Kod openssh uobi\u010dajeni setup kod pristupanja servera koji su iza firewalla mi je da koristi ssh od nekog servera koji je javno dostupan da se tuneli\u0161em ka ma\u0161ini u internoj mre\u017ei.<\/p>\n<p>To mo\u017ee da se izvede na dosta na\u010dina, ali meni omiljeni, i ujedno najprakti\u010dniji je kori\u0161\u0107enjem openssh opencije ProxyCommand<\/p>\n<p>Primer ~\/.ssh\/config<\/p>\n<pre>\r\nHost javni-host\r\n   Hostname javni.neki.tamo\r\n   Port 99999\r\n\r\nHost interni-host\r\n   Hostname 192.168.x.y\r\n   ProxyCommand ssh -q javni-host nc -q0 %h %p\r\n<\/pre>\n<p>I ovo fenomenalno funkcioni\u0161e jer potom ssh\/scp ka interni-host potpuno transparentno funkcioni\u0161u.<\/p>\n<p>Probelm, za neke (legacy) sisteme potreban mi je putty zbog terminal emulacije. Gledaju\u0107i po opcijama ne izgleda ba\u0161 o\u010digledno ali ipak postoji potpuno identi\u010dna opcija.<\/p>\n<p><a href=\"http:\/\/zsteva.info\/blog\/wp-content\/uploads\/2016\/05\/putty-proxycommand.png\"><img loading=\"lazy\" src=\"http:\/\/zsteva.info\/blog\/wp-content\/uploads\/2016\/05\/putty-proxycommand.png\" alt=\"putty-proxycommand\" width=\"617\" height=\"560\" class=\"alignright size-full wp-image-415\" srcset=\"http:\/\/zsteva.info\/blog\/wp-content\/uploads\/2016\/05\/putty-proxycommand.png 617w, http:\/\/zsteva.info\/blog\/wp-content\/uploads\/2016\/05\/putty-proxycommand-300x272.png 300w\" sizes=\"(max-width: 617px) 100vw, 617px\" \/><\/a><\/p>\n<p>Host\/Port\/Protocol podesiti kao da smo u internoj mre\u017ei. A u <strong>Connection > Proxy<\/strong>><\/p>\n<p><strong>Proxy type: Local<\/strong><\/p>\n<p>Telnet command or local proxy command:<\/p>\n<p><strong>SSH_ASKPASS=\/usr\/bin\/qt4-ssh-askpass ssh -q javni-host nc -q0 %host %port<\/strong><\/p>\n<p>Mo\u017ee i bez SSH_ASKPASS, ali onda putty mora uvek da se otvara iz terminala.<\/p>\n<p>Efekat je potpuno identi\u010dan kao sa openssh.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kod openssh uobi\u010dajeni setup kod pristupanja servera koji su iza firewalla mi je da koristi ssh od nekog servera koji je javno dostupan da se tuneli\u0161em ka ma\u0161ini u internoj mre\u017ei. To mo\u017ee da se izvede na dosta na\u010dina, ali &hellip; <a href=\"http:\/\/zsteva.info\/blog\/2016\/05\/putty-proxycommand\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[136,6,119],"tags":[],"_links":{"self":[{"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/posts\/414"}],"collection":[{"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":1,"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/posts\/414\/revisions"}],"predecessor-version":[{"id":416,"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/posts\/414\/revisions\/416"}],"wp:attachment":[{"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/media?parent=414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/categories?post=414"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zsteva.info\/blog\/wp-json\/wp\/v2\/tags?post=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}